- Build a straw man argument
- Act like all threat models are the same (distributed vs. centralized password store, for example).
- Build a straw man argument
- Act like all threat models are the same (distributed vs. centralized password store, for example).